Copyright @ 2019 Global Cyber Alliance
Use this tool if you have an iPhone, iPad, or macOS device.
Use this tool if you are running a Windows operating system.
Use this tool if you have Microsoft Office for Mac.
Use this tool to encrypt your Microsoft Windows systems.
Use this tool to encrypt your Mac systems.
Use/customize this template to build your company's USB use policy.
Use/customize this template to build your company's patching policy.
Use this tool if you have an Android device.
Use this tool to inventory and manage your computers, mobile devices and applications.
Use this tool to find weaknesses on your websites.
Use this tool to find encryption weaknesses on your websites.
“Time” defines the approximate time it will take to implement the tool, including installation and setup. Based on your system and experience, the time may be longer or shorter than the time estimated.
Requires minimal technical knowledge to complete setup. Users with little-to-no familiarity with computer systems will still easily be able to implement Level 1 tools.
Requires basic technical understanding of operating systems and settings controls. Users with a basic understanding will be able to easily implement Level 2 tools.
Requires an intermediate level of understanding to implement. Users will need an intermediate understanding of computer systems and code languages.
Requires advanced levels of understanding of computer systems, settings and code languages. Users will need experience with advanced system configurations.